Deleted tweet detection is currently running at reduced
capacity due to changes to the Twitter API. Some tweets that have been
deleted by the tweet author may not be labeled as deleted in the PolitiTweet
interface.
Showing page 63 of 151.
Joanna Rutkowska @rootkovska
RT @isislovecruft: If you leak private info (urls, typing cadence) to the network, it doesn't matter how good the crypto is—your app isn't… — PolitiTweet.org
Joanna Rutkowska @rootkovska
RT @mulander: For those that were asking - @whispersystems #signal doesn't leak data by fetching previous. I checked (on Android). https://… — PolitiTweet.org
Joanna Rutkowska @rootkovska
RT @mulander: Very creepy @WhatsApp, someone was apparently typing in an URL and WhatsApp was fetching it off my server char-by-char https:… — PolitiTweet.org
Joanna Rutkowska @rootkovska
RT @epakskape: @kautuhala We primarily view KASLR as a mitigation against remote exploits — PolitiTweet.org
Joanna Rutkowska @rootkovska
RT @AdamOfDc949: @rootkovska In case you didn't already see these: https://t.co/VnCShDUpgj https://t.co/rTdaJOaMtI I have a feeling you mi… — PolitiTweet.org
Joanna Rutkowska @rootkovska
Also reminded me the work on IOMMU attacks, which Rafał & I did in 2011. AFAIK still the only software IOMMU bypass? https://t.co/dIds0KXATO — PolitiTweet.org
Joanna Rutkowska @rootkovska
PCIe and IOMMU fuzzing by Google engineers. Interesting. Also can't wait until they start fuzzing CPU instructions… https://t.co/XxMaTMd8AB — PolitiTweet.org
Julia Hansbrough @flowerhack
My day job involves breaking hardware and it's pretty fun: https://t.co/ER8zP1M78E
Joanna Rutkowska @rootkovska
RT @Tails_live: Tails 3.0 is out: https://t.co/cMOzflkO1H based on @Debian 9, brand new startup and shutdown, security improvements in dept… — PolitiTweet.org
Joanna Rutkowska @rootkovska
@qwazix cost — PolitiTweet.org
Joanna Rutkowska @rootkovska
@qwazix 2. I'm far from suggesting that locking down users (DRM-style) is the solution. Check e.g.: https://t.co/FObjX3KhAf — PolitiTweet.org
Joanna Rutkowska @rootkovska
@qwazix 1. Not every adversary wants to kill the victim. There are many scenarios where they'd prefer subtle means… https://t.co/FhTiOeQr6F — PolitiTweet.org
Joanna Rutkowska @rootkovska
There is no spoon. https://t.co/G1PYrnF7qO — PolitiTweet.org
Katherine Scott @kscottz
I had to double check this using the Gimp. It is not a fake. Seeing is not believing. https://t.co/q8zHa4HIPH
Joanna Rutkowska @rootkovska
@c_pellegrino Yes. Or something like that. — PolitiTweet.org
Joanna Rutkowska @rootkovska
@daveaitel @dwizzzleMSFT Exactly what I wanted to ask also... What's your threat model, guys? — PolitiTweet.org
Joanna Rutkowska @rootkovska
@AliMirjamali Yes, for many reasons, and we're working on this. But for Qubes 4.1. — PolitiTweet.org
Joanna Rutkowska @rootkovska
But attackers might exploit DP to force GPU to DMA? And proper way to cut this is via GUIdom, not by disabling DMA on lock screen, IMHO. — PolitiTweet.org
Joanna Rutkowska @rootkovska
Normally this is not a problem, since GPU often part of the CPU package, so need to be trusted anyway. However... — PolitiTweet.org
Joanna Rutkowska @rootkovska
But to be fair: only Qubes 4.1 (i.e. when we introduce full GUI domain) will be protected against DMA from malicious GPU devices. — PolitiTweet.org
Joanna Rutkowska @rootkovska
Only a few more and it'll be just like on Qubes ;) - USBGuard - NetStackGuard - GUIGuard (aka win32k) - ClipboardGu… https://t.co/1PVKIwvyTX — PolitiTweet.org
Alex Ionescu @aionescu
Windows RS3 19093+ Introduce "DMA Guard" which uses GUID_CONSOLE_LOCKED and Session Notifications to disable DMA at the lock screen.
Joanna Rutkowska @rootkovska
RT @aionescu: Windows RS3 19093+ Introduce "DMA Guard" which uses GUID_CONSOLE_LOCKED and Session Notifications to disable DMA at the lock… — PolitiTweet.org
Joanna Rutkowska @rootkovska
Very true & very disappointing. Also contrasts with how we - humans - tend to boast our intellectual superiority o… https://t.co/zKhDT9mK68 — PolitiTweet.org
Dino A. Dai Zovi @dinodaizovi
Anything that requires many people to have advanced knowledge doesn't scale. The reason software exists is to encapsulate domain knowledge.
Joanna Rutkowska @rootkovska
Complete misunderstanding example (of both my intention, and threat model): https://t.co/wN1jO6OnDV — PolitiTweet.org
qwazix @qwazix
Another excuse to lock users out of their computers. As if #BadValet couldn't just install a bomb under the hood a… https://t.co/P5bHTSNhEy
Joanna Rutkowska @rootkovska
But at least let's hope it's _well_ compartmentalized, so no _trivial_ access to mics, gps, etc, right? (Not to mention core car systems..) — PolitiTweet.org
Joanna Rutkowska @rootkovska
When was the last time you left your car at a car wash? #BadValet is the new #EvilMaid, who would have thought... https://t.co/yyDxTFKvva — PolitiTweet.org
Jay Turla @shipcod3
Just a simple PoC that the USB port is an attack surface for a Mazda's infotainment system https://t.co/pmaD14V0r7 https://t.co/zMhbDCblfh
Joanna Rutkowska @rootkovska
RT @thegrugq: Real talk on Reality — some thoughts on Reality Winner. https://t.co/3sFPjprnoU — PolitiTweet.org
Joanna Rutkowska @rootkovska
RT @lyon01_david: 300 pages of spec for ADS-B (aviation) and no mention of security :D https://t.co/TtX5jP0Uf6 — PolitiTweet.org
Joanna Rutkowska @rootkovska
RT @XenoKovah: Remember that time we showed using AMT SOL for C2 from SMM...? https://t.co/cP8tYtT5hE section 6.2 https://t.co/Fdtrwq59fP — PolitiTweet.org
Joanna Rutkowska @rootkovska
Just another covert channel (cooperation on both ends required), only with the help of AMT.. But also: unexpected a… https://t.co/qJ77M4jY8j — PolitiTweet.org
Windows Defender Security Intelligence @WDSecurity
PLATINUM attackers can use Intel AMT SOL for stealthy C2 even with network cards disabled. Analysis and demo at… https://t.co/Ur2CvNN46a
Joanna Rutkowska @rootkovska
That sounds like a cool watermarking indeed! Can imagine easily doable for source code also and not to mention bina… https://t.co/egDOhJf2FX — PolitiTweet.org
Emily Pixels @PixlEmly
@rootkovska most interesting one switched out words for synonyms keyed off the viewing userid
Joanna Rutkowska @rootkovska
1. Can easily imagine watermarking which survives color->B&W conversion, 2. Feeding untrusted PDFs to ImageMagick is... controversial. — PolitiTweet.org